+44 (0) 203 588 3023

ANTI-WEBINARS

Richard Nootebos

Country manager, Netwrix

Hot IT security topics

30 minutes or shorter

Your productive coffee break

Watch or listen as a podcast

No technical demos

CYBERSECURITY

RECORDED SESSIONS:

Many people think that IT risk assessment has to be a complicated and expensive process. Let's bust this myth together! In this session, we discuss the 5 most common myths about IT risk assessment, and you can create a list of key steps in an effective risk assessment program.

Don't waste time on IT risks

Never miss a Microsoft 365-related threat

IT pros are superheroes. Let's talk about how you can make your lives easier and keep your Microsoft 365 environment manageable and secure by following some best practices and top-notch tips.

You probably already know that most of IT security incidents are caused not by an external attack, but by users. How do you make sure you detect mistakes before any harm is done?

We know what you did last summer

The Good, the Bad,

and the Ugly

How to know that you are investing in the right Data Classification solution? Why is it important to use Data Classification in the first place?

A Fistful of Dollars (Bitcoins)

Ransomware is here to stay and is evolving. Learn about the latest news and a real-life case study. Discover the best practices to protect your data against ransomware.

The Hateful Eight

Let's talk about 8 annoying incidents in your IT infrastructure you need to always be on top of. We will show you how to easily pull up reports that will help you gain visibility in your infrastructure.

Stay on top of the latest news and trends in IT security

Follow us

© 2020 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

300 Spectrum Center Drive, Suite 200 Irvine, CA 92618

ANTI-WEBINARS

Hot IT security topics

30 minutes or shorter

Your productive coffee break

Watch or listen as a podcast

No technical demos

CYBERSECURITY

RECORDED SESSIONS:

Don't waste time on IT risks

Many people think that IT risk assessment has to be a complicated and expensive process. Let's bust this myth together! In this session, we discuss the 5 most common myths about IT risk assessment, and you can create a list of key steps in an effective risk assessment program.

Never miss a Microsoft 365-related threat

IT pros are superheroes. Let's talk about how you can make your lives easier and keep your Microsoft 365 environment manageable and secure by following some best practices and top-notch tips.

We know what you did last summer

You probably already know that most of IT security incidents are caused not by an external attack, but by users. How do you make sure you detect mistakes before any harm is done?

The Good, the Bad and the Ugly

How to know that you are investing in the right Data Classification solution? Why is it important to use Data Classification in the first place?

A Fistful of Dollars (Bitcoins)

Ransomware is here to stay and is evolving. Learn about the latest news and a real-life case study. Discover the best practices to protect your data against ransomware.

The Hateful Eight

Let's talk about 8 annoying incidents in your IT infrastructure you need to always be on top of. We will show you how to easily pull up reports that will help you gain visibility in your infrastructure.

© 2020 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

300 Spectrum Center Drive, Suite 200 Irvine, CA 92618